{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:24:30Z","timestamp":1774160670027,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/latincom.2015.7430139","type":"proceedings-article","created":{"date-parts":[[2016,3,10]],"date-time":"2016-03-10T21:48:52Z","timestamp":1457646532000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["A simple scheme for pseudo clustering algorithm for cross layer intrusion detection in MANET"],"prefix":"10.1109","author":[{"given":"Amar","family":"Amouri","sequence":"first","affiliation":[]},{"given":"Luis G.","family":"Jaimes","sequence":"additional","affiliation":[]},{"given":"Raju","family":"Manthena","sequence":"additional","affiliation":[]},{"given":"Salvatore D.","family":"Morgera","sequence":"additional","affiliation":[]},{"given":"Idalides J.","family":"Vergara-Laurens","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2005.1"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MWC.2007.4396943","article-title":"Intrusion detection techniques in mobile ad hoc and wireless sensor networks","volume":"14","author":"bo","year":"2007","journal-title":"Wireless Communications IEEE"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_17"},{"key":"ref13","author":"wang","year":"2005","journal-title":"Feature selection in intrusion detection system over mobile ad-hoc network"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1423333"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2007.03.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605939"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/49.780355"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00201"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1109\/ICDCS.2003.1203498","article-title":"Cross-feature analysis for detecting ad-hoc routing anomalies","author":"huang","year":"2003","journal-title":"Distributed Computing Systems 2003 Proceedings 23rd International Conference on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1233531"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"}],"event":{"name":"2015 7th IEEE Latin-American Conference on Communications (LATINCOM)","location":"Arequipa, Peru","start":{"date-parts":[[2015,11,4]]},"end":{"date-parts":[[2015,11,6]]}},"container-title":["2015 7th IEEE Latin-American Conference on Communications (LATINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7422343\/7430110\/07430139.pdf?arnumber=7430139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T08:05:46Z","timestamp":1498291546000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7430139\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/latincom.2015.7430139","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}